共查询到20条相似文献,搜索用时 62 毫秒
1.
针对战术数据链无线网络典型入侵事件,基于演化算法和神经网络提出了一种基于演化神经网络的入侵检测方法。通过仿真实验和性能对比验证了该方法的有效性,对战术数据链系统的安全设计有一定的指导意义。 相似文献
2.
3.
现代战争中,战术数据链已成为作战指挥控制的神经枢纽,越来越受到各国的重视;本文对国外典型战术数据链的发展作了简要介绍,并分析战术数据链的发展方向,提出战术网络数据链的概念。 相似文献
4.
5.
6.
战术数据链是军事综合电子信息系统的重要组成部分之一。经过半个多世纪的发展,战术数据链已经从最初只能用于特定军种和特定平台的无保密、无抗干扰和无导航功能的专用数据链,发展到可跨军种使用、保密、抗干扰,且具有导航和识别功能的通用教据链。与此同时,数据链的组织与规划也变得更加复杂。文章以Link16为例,分析了战术数据链的组织机构设置、人员职责、多数据链规划和参数分发过程,对我军数据链的建设具有借鉴意义。 相似文献
7.
8.
9.
10.
传统的链路自适应技术只追求高效数据传输,会导致射频暴露,在电子战中无法保障数据链载体的安全性。以战术数据链主动射频隐身和高效通信为研究对象,利用多目标优化技术联合控制战术数据链的射频辐射特征(包含辐射时间、辐射功率和辐射波形),建立了一种战术数据链链路自适应技术模型。该模型以给定距离的截获概率和给定距离的可靠传输速率为二重优化目标,以辐射特征为优化变量,并以第四代宽带无线通信系统LTE-A(Long Term Evolution-Advanced)的部分调制编码参数为实例,证实了由所述链路自适应技术模型优化所得的最优解可以同时实现数据链的射频隐身和高效数据传输。 相似文献
11.
无线网络中基于贝叶斯博弈模型的入侵检测算法研究 总被引:2,自引:0,他引:2
运用贝叶斯博弈理论对无线网络中入侵检测参数调整问题进行研究,设计入侵检测博弈模型,根据博弈中的完美均衡设计入侵检测时间间隔调整算法TSMA-BG和参数修正算法DPMA.仿真实验证明,这2种算法使入侵检测系统能够有效地检测出发生变化的攻击行为. 相似文献
12.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models. 相似文献
13.
Tran Hoang Hai Eui‐Nam Huh Minho Jo 《Wireless Communications and Mobile Computing》2010,10(4):559-572
In recent years, Wireless Sensor Networks (WSNs) have demonstrated successful applications for both civil and military tasks. However, sensor networks are susceptible to multiple types of attacks because they are randomly deployed in open and unprotected environments. It is necessary to utilize effective mechanisms to protect sensor networks against multiple types of attacks on routing protocols. In this paper, we propose a lightweight intrusion detection framework integrated for clustered sensor networks. Furthermore, we provide algorithms to minimize the triggered intrusion modules in clustered WSNs by using an over‐hearing mechanism to reduce the sending alert packets. Our scheme can prevent most routing attacks on sensor networks. In in‐depth simulation, the proposed scheme shows less energy consumption in intrusion detection than other schemes. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
14.
Intrusion detection is prominently important for civil and military applications in wireless sensor networks (WSNs). To date, related works address the problem by assuming a straight‐line intrusion path and a Boolean sensing model. However, a straight‐line intrusion path is often not the case in reality, and the Boolean sensing model cannot resemble a real‐world sensor precisely. Results based on these assumptions are therefore not applicable with desirable accuracy in practice. In view of this, we propose a novel sine‐curve mobility model that can simulate different intrusion paths by adjusting its features (amplitude, frequency, and phase) and can be integrated into the random WSN model for intrusion detection analysis. It can also be applied to different sensor models and makes influencing factors tractable. With the model, we examine the effects of different intrusion paths on the intrusion detection probability in a random WSN, considering both Boolean and realistic Elfes sensing models. Further, we investigate the interplays between network settings and intruder's mobility patterns and identify the benefits and side effects of the model theoretically and experimentally. Simulation outcomes are shown to match well with the theoretical results, validating the modeling, analysis, and conclusions. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
15.
在入侵检测中应用神经网络技术,可以大大提高入侵检测的检测率,有效提高网络数据的安全。本文分析了BP神经网络应用于入侵检测的实现方式及存在的问题,并对现有的BP神经网络算法进行改进,阐述了基于BP神经网络入侵检测系统及仿真实验。 相似文献
16.
17.
异常入侵检测方法的研究 总被引:1,自引:0,他引:1
入侵检测技术作为保护网络安全的一种解决方案,越来越受到人们的重视。根据入侵检测原理的不同,入侵检测可分为误用检测和异常检测两种。分析了几种常用的异常入侵检测方法,最后讨论了现在入侵检测技术面临的问题以及今后的发展方向。 相似文献
18.
近年来,随着物联网技术的发展,MANET网络介入互联网已经成为了一种趋势.而MANET网络中的入侵检测系统可以有效地保障MANET的安全运行.针对MANET网络的动态性和开放性以及节点计算存储资源的有限性,文中提出基于入侵检测系统(IDS)代理的协作式层次化的入侵检测系统. 相似文献
19.
给出了一个检测分布式攻击的入侵检测系统模型的设计,该模型采用基于特征的方法,能够实现数据收集方法在单独场所所不能实现的对分布式攻击的检测。跟其他方法相比,该方法能够极大的降低入侵检测式的通信量,从而简化了通讯安全管理的复杂性。 相似文献